"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:58:05 +00:00
parent f2ba6b7839
commit 871a646982
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 4049 additions and 4049 deletions

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "FreeBSD-SA-01:52",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:52.fragment.asc"
},
{
"name" : "NetBSD-SA2001-006",
"refsource" : "NETBSD",
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-006.txt.asc"
},
{
"name": "bsd-ip-fragments-dos(6636)",
"refsource": "XF",
@ -71,6 +61,16 @@
"name": "2799",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2799"
},
{
"name": "NetBSD-SA2001-006",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-006.txt.asc"
},
{
"name": "FreeBSD-SA-01:52",
"refsource": "FREEBSD",
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:52.fragment.asc"
}
]
}

View File

@ -67,16 +67,16 @@
"refsource": "CONFIRM",
"url": "ftp://ftp.tivoli.com/support/patches/patches_3.7.1/3.7.1-POL-0003/3.7.1-POL-0003.README"
},
{
"name" : "tivoli-secureway-dot-directory-traversal(6884)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6884"
},
{
"name": "3080",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3080"
},
{
"name": "tivoli-secureway-dot-directory-traversal(6884)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6884"
},
{
"name": "1908",
"refsource": "OSVDB",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20010821 Bug in MAS90 Accounting Platform remote access?",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-08/0312.html"
},
{
"name": "mas-telnet-connect-dos(7020)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7020"
},
{
"name": "20010821 Bug in MAS90 Accounting Platform remote access?",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0312.html"
},
{
"name": "3221",
"refsource": "BID",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20011228 PHP Rocket Add-in (file transversal vulnerability)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/247559"
"name": "phprocket-directory-traversal(7749)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7749"
},
{
"name": "3751",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/3751"
},
{
"name" : "phprocket-directory-traversal(7749)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7749"
"name": "20011228 PHP Rocket Add-in (file transversal vulnerability)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/247559"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/195457"
},
{
"name" : "2997",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2997"
},
{
"name": "tcp-mss-dos(6824)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6824"
},
{
"name": "2997",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2997"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0092.html"
},
{
"name" : "20010818 Cobalt update for my Webmail issue.",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-08/0245.html"
},
{
"name": "cobalt-qube-directory-traversal(6805)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6805"
},
{
"name": "20010818 Cobalt update for my Webmail issue.",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0245.html"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "19861",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19861"
},
{
"name": "20060427 SQL injection exploit IPB <= 2.1.4",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432248/100/0/threaded"
},
{
"name" : "17719",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17719"
},
{
"name": "25021",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25021"
},
{
"name" : "19861",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19861"
"name": "invision-fromcontact-sql-injection(26107)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26107"
},
{
"name": "17719",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17719"
},
{
"name": "813",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/813"
},
{
"name" : "invision-fromcontact-sql-injection(26107)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26107"
}
]
}

View File

@ -52,120 +52,120 @@
},
"references": {
"reference_data": [
{
"name" : "http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"
},
{
"name" : "DSA-1097",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1097"
},
{
"name" : "DSA-1103",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1103"
},
{
"name" : "MDKSA-2006:123",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:123"
},
{
"name" : "MDKSA-2006:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:150"
},
{
"name": "RHSA-2006:0493",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0493.html"
},
{
"name" : "SUSE-SA:2006:028",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006-05-31.html"
},
{
"name" : "2006-0026",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2006/0026"
},
{
"name" : "USN-302-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-302-1"
"name": "ADV-2006-2554",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2554"
},
{
"name": "17955",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17955"
},
{
"name" : "oval:org.mitre.oval:def:9531",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531"
},
{
"name" : "ADV-2006-2554",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2554"
},
{
"name" : "25746",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25746"
},
{
"name" : "20237",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20237"
},
{
"name" : "20671",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20671"
},
{
"name": "20716",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20716"
},
{
"name" : "20914",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20914"
},
{
"name" : "21045",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21045"
},
{
"name" : "21745",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21745"
},
{
"name" : "20398",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20398"
},
{
"name": "21476",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21476"
},
{
"name": "21745",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21745"
},
{
"name": "MDKSA-2006:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:150"
},
{
"name": "USN-302-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-302-1"
},
{
"name": "MDKSA-2006:123",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:123"
},
{
"name": "DSA-1097",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1097"
},
{
"name": "SUSE-SA:2006:028",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006-05-31.html"
},
{
"name": "http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6"
},
{
"name": "2006-0026",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2006/0026"
},
{
"name": "DSA-1103",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1103"
},
{
"name": "linux-sctp-skb-pull-dos(26432)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26432"
},
{
"name": "21045",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21045"
},
{
"name": "20237",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20237"
},
{
"name": "20398",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20398"
},
{
"name": "25746",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25746"
},
{
"name": "oval:org.mitre.oval:def:9531",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531"
},
{
"name": "20671",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20671"
},
{
"name": "20914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20914"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name": "20300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20300"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=370576",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=370576"
},
{
"name" : "http://sourceforge.net/forum/forum.php?forum_id=577228",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/forum/forum.php?forum_id=577228"
"name": "base-path-file-include(26652)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26652"
},
{
"name": "1823",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1823"
},
{
"name" : "18298",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18298"
},
{
"name": "ADV-2006-1996",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1996"
},
{
"name": "18298",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18298"
},
{
"name": "25770",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25770"
},
{
"name" : "20300",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20300"
},
{
"name" : "base-path-file-include(26652)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26652"
"name": "http://sourceforge.net/forum/forum.php?forum_id=577228",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/forum/forum.php?forum_id=577228"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20061119 LoudMouth => 2.4 Remote File Include Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/452085/100/100/threaded"
},
{
"name": "1905",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1905"
},
{
"name": "20061119 LoudMouth => 2.4 Remote File Include Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452085/100/100/threaded"
},
{
"name": "loudmouth-loudmouth-file-include(30409)",
"refsource": "XF",

View File

@ -53,9 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20061207 TSRT-06-15: Citrix Presentation Server Client ActiveX Heap Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453760/100/0/threaded"
"name": "23246",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23246"
},
{
"name": "1995",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1995"
},
{
"name": "ADV-2006-4865",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4865"
},
{
"name": "citrix-wfica-bo(30740)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30740"
},
{
"name": "21458",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21458"
},
{
"name": "5106",
@ -63,9 +83,9 @@
"url": "https://www.exploit-db.com/exploits/5106"
},
{
"name" : "http://fortconsult.net/files/fortconsult.dk/citrix_advisory_dec2006.pdf",
"refsource" : "MISC",
"url" : "http://fortconsult.net/files/fortconsult.dk/citrix_advisory_dec2006.pdf"
"name": "VU#210969",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/210969"
},
{
"name": "http://www.tippingpoint.com/security/advisories/TSRT-06-15.html",
@ -78,24 +98,9 @@
"url": "http://support.citrix.com/article/CTX111827"
},
{
"name" : "http://www.citrix.com/English/SS/downloads/downloads.asp?dID=2755",
"refsource" : "CONFIRM",
"url" : "http://www.citrix.com/English/SS/downloads/downloads.asp?dID=2755"
},
{
"name" : "VU#210969",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/210969"
},
{
"name" : "21458",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21458"
},
{
"name" : "ADV-2006-4865",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4865"
"name": "http://fortconsult.net/files/fortconsult.dk/citrix_advisory_dec2006.pdf",
"refsource": "MISC",
"url": "http://fortconsult.net/files/fortconsult.dk/citrix_advisory_dec2006.pdf"
},
{
"name": "1017343",
@ -103,19 +108,14 @@
"url": "http://securitytracker.com/id?1017343"
},
{
"name" : "23246",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23246"
"name": "http://www.citrix.com/English/SS/downloads/downloads.asp?dID=2755",
"refsource": "CONFIRM",
"url": "http://www.citrix.com/English/SS/downloads/downloads.asp?dID=2755"
},
{
"name" : "1995",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/1995"
},
{
"name" : "citrix-wfica-bo(30740)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30740"
"name": "20061207 TSRT-06-15: Citrix Presentation Server Client ActiveX Heap Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453760/100/0/threaded"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20061115 [MajorSecurity Advisory #34]Plesk 8 - Multiple Cross Site Scripting Issues",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=116370467532206&w=2"
"name": "plesk-getpassword-loginup-xss(30320)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30320"
},
{
"name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls34",
"refsource": "MISC",
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls34"
},
{
"name" : "21067",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/21067"
},
{
"name": "1017236",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017236"
},
{
"name" : "plesk-getpassword-loginup-xss(30320)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30320"
"name": "20061115 [MajorSecurity Advisory #34]Plesk 8 - Multiple Cross Site Scripting Issues",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=116370467532206&w=2"
},
{
"name": "21067",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21067"
}
]
}

View File

@ -57,16 +57,21 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454185/100/0/threaded"
},
{
"name" : "http://www.sitekiosk.com/th_support/versions/index.php3?id=39",
"refsource" : "CONFIRM",
"url" : "http://www.sitekiosk.com/th_support/versions/index.php3?id=39"
},
{
"name": "21567",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21567"
},
{
"name": "sitekiosk-activex-information-disclosure(30878)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30878"
},
{
"name": "http://www.sitekiosk.com/th_support/versions/index.php3?id=39",
"refsource": "CONFIRM",
"url": "http://www.sitekiosk.com/th_support/versions/index.php3?id=39"
},
{
"name": "ADV-2006-4985",
"refsource": "VUPEN",
@ -76,11 +81,6 @@
"name": "23253",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23253"
},
{
"name" : "sitekiosk-activex-information-disclosure(30878)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30878"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-0563",
"STATE": "PUBLIC"
},
@ -53,15 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
"name": "ADV-2011-0492",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0492"
},
{
"name": "43470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43470"
},
{
"name": "RHSA-2011:0301",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0301.html"
},
{
"name": "ADV-2011-0337",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0337"
},
{
"name": "oval:org.mitre.oval:def:12452",
"refsource": "OVAL",
@ -73,19 +83,9 @@
"url": "http://www.securitytracker.com/id?1025033"
},
{
"name" : "43470",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/43470"
},
{
"name" : "ADV-2011-0337",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0337"
},
{
"name" : "ADV-2011-0492",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2011/0492"
"name": "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2201",
"STATE": "PUBLIC"
},
@ -53,20 +53,25 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110612 CVE Request -- Data-FormValidator -- Reports invalid field as valid when untaint_all_constraints used",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/12/3"
"name": "48167",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48167"
},
{
"name" : "[oss-security] 20110613 Re: CVE Request -- Data-FormValidator -- Reports invalid field as valid when untaint_all_constraints used",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/13/13"
"name": "https://rt.cpan.org/Public/Bug/Display.html?id=61792",
"refsource": "CONFIRM",
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=61792"
},
{
"name": "[oss-security] 20110613 Re: CVE Request -- Data-FormValidator -- Reports invalid field as valid when untaint_all_constraints used",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/13/5"
},
{
"name": "[oss-security] 20110612 CVE Request -- Data-FormValidator -- Reports invalid field as valid when untaint_all_constraints used",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/12/3"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629511",
"refsource": "CONFIRM",
@ -78,19 +83,14 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=712694"
},
{
"name" : "https://rt.cpan.org/Public/Bug/Display.html?id=61792",
"refsource" : "CONFIRM",
"url" : "https://rt.cpan.org/Public/Bug/Display.html?id=61792"
"name": "[oss-security] 20110613 Re: CVE Request -- Data-FormValidator -- Reports invalid field as valid when untaint_all_constraints used",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/13/13"
},
{
"name": "FEDORA-2011-11680",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065416.html"
},
{
"name" : "48167",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48167"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/mac/1110/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/mac/1110/"
},
{
"name" : "http://www.opera.com/docs/changelogs/unix/1110/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/unix/1110/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1110/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1110/"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1110/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1110/"
},
{
"name": "opera-empty-parameter-dos(68452)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68452"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1110/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1110/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2731",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814"
},
{
"name": "http://support.springsource.com/security/cve-2011-2731",
"refsource": "CONFIRM",
"url": "http://support.springsource.com/security/cve-2011-2731"
},
{
"name" : "1029151",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029151"
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814"
},
{
"name": "55155",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55155"
},
{
"name": "1029151",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029151"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=123481",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=123481"
},
{
"name" : "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html"
"name": "chrome-ogg-container-code-exec(75600)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75600"
},
{
"name": "GLSA-201205-03",
@ -73,9 +68,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html"
},
{
"name" : "53540",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53540"
"name": "1027067",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027067"
},
{
"name": "oval:org.mitre.oval:def:15159",
@ -83,14 +78,19 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15159"
},
{
"name" : "1027067",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1027067"
"name": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html"
},
{
"name" : "chrome-ogg-container-code-exec(75600)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75600"
"name": "53540",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53540"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=123481",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=123481"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/CopperminePhotoGallery-1.5.12",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/CopperminePhotoGallery-1.5.12"
},
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/CopperminePhotoGallery-1.5.12",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/CopperminePhotoGallery-1.5.12"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-4267",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"name" : "http://www.opera.com/docs/changelogs/unix/1160/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1160/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1160/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://xss.cx/examples/plesk-reports/plesk-10.2.0.html",
"refsource" : "MISC",
"url" : "http://xss.cx/examples/plesk-reports/plesk-10.2.0.html"
},
{
"name": "ppsbp-sitebuilder-unspecified(72213)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72213"
},
{
"name": "http://xss.cx/examples/plesk-reports/plesk-10.2.0.html",
"refsource": "MISC",
"url": "http://xss.cx/examples/plesk-reports/plesk-10.2.0.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html",
"refsource" : "MISC",
"url" : "http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html"
},
{
"name": "ppsbp-se-multiple-sql-injection(72215)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72215"
},
{
"name": "http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html",
"refsource": "MISC",
"url": "http://xss.cx/examples/plesk-reports/plesk-10.2.0-site-editor.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-0050",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-0754",
"STATE": "PUBLIC"
},
@ -57,56 +57,56 @@
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-17.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=814026",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=814026"
},
{
"name" : "RHSA-2013:0144",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0144.html"
},
{
"name" : "RHSA-2013:0145",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0145.html"
},
{
"name": "SUSE-SU-2013:0048",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html"
},
{
"name" : "SUSE-SU-2013:0049",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html"
},
{
"name": "openSUSE-SU-2013:0131",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html"
},
{
"name" : "openSUSE-SU-2013:0149",
"name": "RHSA-2013:0145",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0145.html"
},
{
"name": "USN-1681-4",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1681-4"
},
{
"name": "RHSA-2013:0144",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0144.html"
},
{
"name": "SUSE-SU-2013:0049",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html"
},
{
"name": "USN-1681-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1681-1"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=814026",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=814026"
},
{
"name": "openSUSE-SU-2013:0149",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html"
},
{
"name": "USN-1681-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1681-2"
},
{
"name" : "USN-1681-4",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1681-4"
},
{
"name": "oval:org.mitre.oval:def:16812",
"refsource": "OVAL",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-1314",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1324",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-091",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-091"
},
{
"name": "TA13-317A",
"refsource": "CERT",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:19162",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19162"
},
{
"name": "MS13-091",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-091"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/119968/WordPress-WP-Table-Reloaded-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/119968/WordPress-WP-Table-Reloaded-Cross-Site-Scripting.html"
},
{
"name" : "http://tobias.baethge.com/2013/01/maintenance-release-wp-table-reloaded-1-9-4/",
"refsource" : "CONFIRM",
"url" : "http://tobias.baethge.com/2013/01/maintenance-release-wp-table-reloaded-1-9-4/"
},
{
"name" : "57664",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57664"
"name": "wptablereloaded-zeroclipboard-xss(81748)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81748"
},
{
"name": "89754",
"refsource": "OSVDB",
"url": "http://osvdb.org/89754"
},
{
"name": "http://tobias.baethge.com/2013/01/maintenance-release-wp-table-reloaded-1-9-4/",
"refsource": "CONFIRM",
"url": "http://tobias.baethge.com/2013/01/maintenance-release-wp-table-reloaded-1-9-4/"
},
{
"name": "52027",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52027"
},
{
"name" : "wptablereloaded-zeroclipboard-xss(81748)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/81748"
"name": "57664",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57664"
},
{
"name": "http://packetstormsecurity.com/files/119968/WordPress-WP-Table-Reloaded-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/119968/WordPress-WP-Table-Reloaded-Cross-Site-Scripting.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-5554",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5852",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name" : "HPSBUX02943",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
},
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name" : "RHSA-2013:1440",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "63130",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/63130"
},
{
"name": "98543",
"refsource": "OSVDB",
"url": "http://osvdb.org/98543"
},
{
"name": "RHSA-2013:1440",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "HPSBUX02943",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
},
{
"name": "oval:org.mitre.oval:def:18983",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18983"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "63130",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63130"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2152",
"STATE": "PUBLIC"
},
@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20150209 Cisco Prime Infrastructure Cross-Site Request Forgery Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2152"
"name": "cisco-prime-cve20142152-csrf(100747)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100747"
},
{
"name": "72558",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72558"
},
{
"name": "20150209 Cisco Prime Infrastructure Cross-Site Request Forgery Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2152"
},
{
"name": "1031715",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031715"
},
{
"name" : "cisco-prime-cve20142152-csrf(100747)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100747"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "104465",
"refsource": "OSVDB",
"url": "http://osvdb.org/show/osvdb/104465"
},
{
"name": "20140314 Multiple Vulnerabilities in SeedDMS < = 4.3.3",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-03/0101.html"
},
{
"name" : "http://packetstormsecurity.com/files/125726",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/125726"
},
{
"name": "http://sourceforge.net/p/seeddms/code/ci/master/tree/CHANGELOG",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/p/seeddms/code/ci/master/tree/CHANGELOG"
},
{
"name" : "104465",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/show/osvdb/104465"
},
{
"name": "57475",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57475"
},
{
"name": "http://packetstormsecurity.com/files/125726",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/125726"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2634",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "HPSBMU03079",
"refsource" : "HP",
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
},
{
"name" : "SSRT101654",
"refsource" : "HP",
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
},
{
"name": "69379",
"refsource": "BID",
@ -72,6 +62,11 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030756"
},
{
"name": "hp-service-cve20142634-unauth-access(95450)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95450"
},
{
"name": "60028",
"refsource": "SECUNIA",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/60714"
},
{
"name" : "hp-service-cve20142634-unauth-access(95450)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95450"
"name": "SSRT101654",
"refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
},
{
"name": "HPSBMU03079",
"refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2014-2812",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,16 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/32670"
},
{
"name" : "http://packetstormsecurity.com/files/125992/Oracle-Identity-Manager-11g-R2-SP1-Unvalidated-Redirect.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/125992/Oracle-Identity-Manager-11g-R2-SP1-Unvalidated-Redirect.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "66615",
"refsource": "BID",
@ -76,6 +66,16 @@
"name": "105384",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/105384"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "http://packetstormsecurity.com/files/125992/Oracle-Identity-Manager-11g-R2-SP1-Unvalidated-Redirect.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/125992/Oracle-Identity-Manager-11g-R2-SP1-Unvalidated-Redirect.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2014-6601",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2015-0003.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2015-0003.html"
"name": "SUSE-SU-2015:0503",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html"
},
{
"name": "DSA-3144",
@ -68,25 +63,70 @@
"url": "http://www.debian.org/security/2015/dsa-3144"
},
{
"name" : "DSA-3147",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3147"
"name": "RHSA-2015:0079",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "USN-2487-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2487-1"
},
{
"name": "72132",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72132"
},
{
"name": "RHSA-2015:0085",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html"
},
{
"name": "RHSA-2015:0086",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html"
},
{
"name": "GLSA-201603-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-14"
},
{
"name": "SUSE-SU-2015:0336",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html"
},
{
"name": "RHSA-2015:0080",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html"
},
{
"name": "RHSA-2015:0068",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html"
},
{
"name": "USN-2486-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2486-1"
},
{
"name": "GLSA-201507-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201507-14"
},
{
"name" : "HPSBUX03273",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=142496355704097&w=2"
},
{
"name": "SSRT101951",
"refsource": "HP",
@ -102,65 +142,25 @@
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2"
},
{
"name" : "RHSA-2015:0068",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0068.html"
},
{
"name" : "RHSA-2015:0079",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0079.html"
},
{
"name" : "RHSA-2015:0080",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0080.html"
},
{
"name" : "RHSA-2015:0085",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0085.html"
},
{
"name" : "RHSA-2015:0086",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0086.html"
},
{
"name" : "SUSE-SU-2015:0336",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html"
},
{
"name": "openSUSE-SU-2015:0190",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html"
},
{
"name" : "SUSE-SU-2015:0503",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html"
},
{
"name" : "USN-2486-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2486-1"
},
{
"name" : "USN-2487-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2487-1"
},
{
"name" : "72132",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72132"
"name": "HPSBUX03273",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2"
},
{
"name": "1031580",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031580"
},
{
"name": "DSA-3147",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3147"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-03-01.html",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-03-01.html"
},
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource" : "CONFIRM",
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
"name": "1037968",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "96723",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/96723"
},
{
"name" : "1037968",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037968"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
},
{
"name": "https://source.android.com/security/bulletin/2017-03-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0382",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-09-05T00:00:00",
"ID": "CVE-2017-0800",
"STATE": "PUBLIC"
@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-09-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-09-01"
},
{
"name": "100652",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100652"
},
{
"name": "https://source.android.com/security/bulletin/2017-09-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-09-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.477066",
"ID": "CVE-2017-1000248",
"REQUESTER": "dylanishappy1@gmail.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "redis-store",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "<=v1.3.0"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "redis-store"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Unsafe Deserialization"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000467",
"REQUESTER": "sajeeb.lohani@bulletproof.sh",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "LavaLite",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "<= LavaLite v5.2.4"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "LavaLite"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-79"
"value": "n/a"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16430",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-17-888",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-17-888"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-17-888",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-17-888"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20171215 Re: Meinberg LANTIME Web Configuration Utility - Arbitrary File Read",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2017/Dec/50"
},
{
"name": "http://packetstormsecurity.com/files/145388/Meinberg-LANTIME-Web-Configuration-Utility-6.16.008-Arbitrary-File-Read.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/145388/Meinberg-LANTIME-Web-Configuration-Utility-6.16.008-Arbitrary-File-Read.html"
},
{
"name": "20171215 Re: Meinberg LANTIME Web Configuration Utility - Arbitrary File Read",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2017/Dec/50"
}
]
}

View File

@ -88,15 +88,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21999563",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21999563"
},
{
"name": "97066",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97066"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21999563",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21999563"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4731",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4758",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4787",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4957",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{